US20090049351A1 - Method for Creating a Memory Defect Map and Optimizing Performance Using the Memory Defect Map - Google Patents
Method for Creating a Memory Defect Map and Optimizing Performance Using the Memory Defect Map Download PDFInfo
- Publication number
- US20090049351A1 US20090049351A1 US11/838,585 US83858507A US2009049351A1 US 20090049351 A1 US20090049351 A1 US 20090049351A1 US 83858507 A US83858507 A US 83858507A US 2009049351 A1 US2009049351 A1 US 2009049351A1
- Authority
- US
- United States
- Prior art keywords
- memory
- defect map
- target test
- test address
- defective
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000007547 defect Effects 0.000 title claims abstract description 93
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000004519 manufacturing process Methods 0.000 claims abstract description 9
- 230000002950 deficient Effects 0.000 claims description 58
- 238000012360 testing method Methods 0.000 claims description 52
- 230000009977 dual effect Effects 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 6
- 230000005055 memory storage Effects 0.000 claims description 4
- 230000008569 process Effects 0.000 description 13
- 230000008901 benefit Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 9
- 238000012545 processing Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000013101 initial test Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/44—Indication or identification of errors, e.g. for repair
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/18—Address generation devices; Devices for accessing memories, e.g. details of addressing circuits
- G11C29/20—Address generation devices; Devices for accessing memories, e.g. details of addressing circuits using counters or linear-feedback shift registers [LFSR]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C2029/1208—Error catch memory
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C5/00—Details of stores covered by group G11C11/00
- G11C5/02—Disposition of storage elements, e.g. in the form of a matrix array
- G11C5/04—Supports for storage elements, e.g. memory modules; Mounting or fixing of storage elements on such supports
Definitions
- the present disclosure relates generally to computer systems and information handling systems, and, more particularly, to a system and method for creating a map of memory which governs its use by the computer system or information handling system
- An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may vary with respect to the type of information handled; the methods for handling the information; the methods for processing, storing or communicating the information; the amount of information processed, stored, or communicated; and the speed and efficiency with which the information is processed, stored, or communicated.
- information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications.
- information handling systems may include or comprise a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
- a computing system will typically include some type of temporary information storage medium, such as random access memory.
- the amount of memory comprised by the information handling system may be on the order of gigabytes.
- the likelihood that part of the memory will either be manufactured defective or become defective over time increases. If left unmanaged, the presence of defective memory cells, regardless of their size, can cause the information handling system to fail. Such failure can initiate an abrupt end to the current operation of the information handling system, resulting in the loss of critical data.
- the presence of defective memory can prevent the information handling system from starting up altogether.
- a method for storing a memory defect map whereby a memory component is tested for defects at the time of manufacture and any memory defects detected are stored in a memory defect map and used to optimize the system performance.
- the memory defect map is updated and the system's remapping resources optimized as new memory defects are detected during operation.
- a technical advantage of the present invention is that it significantly reduces the cost of an information handling system by allowing the use of memory components with known memory defects without jeopardizing the system performance.
- Availability of a non-volatile memory defect map allows an information handling system to utilize the memory component without “crashing.”
- the memory defect map is coupled to the memory component, the memory component can be moved from one system to another while retaining any defect information. The importance of this improvement is magnified as the system memory is growing to represent a substantial portion of the overall solution cost.
- Another technical advantage of the present invention is that it allows the system to maintain normal operations despite minor deficiencies in the system memory. By minimizing the impact of erroneous memory behavior a system and method in accordance with the present invention can significantly reduce the life cycle expenses associated with an information handling system. Yet another technical advantage of the present disclosure is that it reduces the need for any significant testing and characterization prior to conveying memory defect information to the information handling system. Other technical advantages will be apparent to those of ordinary skill in the art in view of the following specification, claims, and drawings.
- FIG. 1 is a block diagram of the components of an exemplary information handling system
- FIG. 2 is a memory mapped by a memory mapping method.
- FIG. 3 is a memory space including some defective regions.
- FIG. 4 is a Dual In-line Memory Module with its associated Electrically Erasable Programmable Read-Only Memory.
- FIG. 5 is a flow diagram of a first method for using a memory defect map to avoid conducting a memory test on a memory location known to be defective.
- FIG. 6 is a flow diagram of a second method for using a memory defect map to avoid conducting a memory test on a memory location known to be defective.
- FIG. 7 is a block diagram of the memory remapping resources of an information handling system.
- FIG. 8 is a flow diagram of a method for updating a memory defect map and using the stored memory defect map to release the memory remapping resources of a system.
- an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes.
- an information handling system may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price.
- the information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory.
- Additional components of the information handling system may include one or more disk drives, one or more network ports for communication with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display.
- the information handling system may also include one or more buses operable to transmit communications between the various hardware components.
- FIG. 1 Shown in FIG. 1 is a block diagram of a typical information handling system.
- a processor or CPU 100 of the typical information handling system 5 is communicatively coupled to a memory controller hub or north bridge 102 .
- Memory controller hub 102 is coupled to memory 104 and a graphics processing unit 106 .
- Memory controller hub 102 is also coupled to an I/O controller hub or south bridge 108 .
- I/O hub 108 is coupled to storage elements of the computer system, including a storage element 110 such as flash ROM for the Basic Input/Output System (BIOS) of the computer system and the hard drive 112 of the computer system.
- I/O hub 108 may also be coupled to a Super I/O chip 114 , which is itself coupled to many of the I/O ports of the computer system, including keyboard 116 , mouse 118 , and parallel ports 120 .
- BIOS Basic Input/Output System
- FIG. 2 presents a diagram of the memory mapped by an E820 call or similar memory mapping method.
- the information handling system may be comprised of numerous distinct components capable of being addressed as memory, including Dual Inline Memory Modules (DIMMs) 200 and PCI devices 202 , such as discrete graphics cards. These devices are detected during the BIOS initialization period and mapped to determine the location of system-accessible memory during the E820 call.
- the E820 call iteratively calls locations which may contain memory, beginning with the lowest possible address 204 .
- system-accessible memory is located, including DIMMs 200
- the E820 call creates a map of such memory, but may exclude portions of memory from the map when designated as unavailable.
- the memory map is then used by the OS, which only sees the memory mapped as usable by the E820 call.
- FIG. 3 presents an exemplary memory space 300 with some defective regions 304 , 308 , 312 .
- the exemplary memory space may be part of a DIMM or any other component capable of being addressed as memory.
- information regarding the location of the defective memory regions will be stored during manufacture.
- the memory component is tested at the time of manufacture and any information regarding the location of defective memory is stored in a nonvolatile storage device.
- FIG. 4 presents a block diagram of memory elements in traditional DIMMs 400 .
- Recent DIMMs 400 comprise both RAM 402 and a quantity of Electrically Erasable Programmable Read-Only Memory (EEPROM) 404 .
- EEPROM 404 can store Serial Presence Detect (SPD) information, which comprises data regarding the size, speed, electrical requirements and other information about the RAM 402 .
- SPD Serial Presence Detect
- Standards of the JEDEC Solid State Technology Association specify that SPD information be stored in the lower 128 bytes 406 of the EEPROM 404 , but many recent DIMMs 400 include an additional quantity 408 of EEPROM 404 which is not devoted to SPD information.
- each memory component is tested during or subsequent to being manufactured and any memory defect information is stored in a nonvolatile storage.
- the nonvolatile storage is on the memory component itself.
- the unused portion 408 of the EEPROM 404 is used to store information about the location of defective memory in the RAM 402 . Specifically, when a memory cell is identified as defective or it is otherwise determined that the system should not be granted access to that cell, a block of memory containing the memory cell in question is identified and its address is stored in the unused portion 408 of the EEPROM 404 . The collection of defective memory locations is known as the memory defect map.
- the memory defect map need not be stored in the on-chip EEPROM 404 used for SPD. Rather, any form of non-volatile storage could be utilized to store the map.
- a standard EEPROM 404 has the advantages of already being widely implemented and at least partially available for storage of the map. It is desirable that the memory map be stored on the DIMM itself, since it is advantageous for the map to remain with the DIMM it maps when, for example, the DIMM is moved from one system to another. Once the DIMM or other memory component is mated to a specific system, the memory defect information which is stored on the DIMM itself can be retrieved and used by the system as part of its memory allocation scheme.
- the memory defect information or memory defect map is a map where each entry corresponds to a region of physical address on the memory component. For example, where the memory component is a DIMM, these regions are defined by the DIMM capacity amortized across the number of entries in the map. The size of a memory block designated as defective is thus equal to the DIMM capacity divided by the number of bits in the defect map.
- the memory defect map is not limited to the information stored on the memory component during the manufacture process as disclosed here. For example, defect information may be obtained by an exhaustive software based memory test or an external test mechanism. The stored memory defect map can be used to optimize the system performance in a variety of ways.
- the memory defect map may be used as a means for avoiding disruption of subsequent memory tests.
- Memory test are commonly carried out by an information handling system.
- the BIOS may run an onboard test of the memory components.
- the memory test will also analyze the areas in the memory components where defects are already known to exist. Depending on the severity of the defect in the defective region, the analysis of the defective region may disrupt the test and potentially erode the behavior of the test.
- the stored memory defect map may be used to avoid redundant testing of regions already known to be defective.
- a memory test is conducted to determine whether the target address nevertheless contains defective memory locations. As would be appreciated by those of ordinary skill in the art, with the benefit of this disclosure, a number of different tests may be conducted to determine whether the target location is a defective memory space.
- the result of the memory test is used to decide whether the target address corresponds to a defective memory location. If the target address is not defective then the process will continue to step 510 where it is determined whether there are more memory locations to be tested. If not the process terminates at 512 and if there are more memory locations to be tested, then the next address to be tested as retrieved at 514 . In contrast, if the target address is defective then the memory defect map is updated at step 516 and the target address is added to the list of addresses corresponding to defective memory locations before searching for additional locations to be tested.
- FIG. 6 depicts a second method for using a stored memory defect map to avoid memory testing of memory regions known to be defective.
- the test target address is incremented to reflect the first available address outside of the defective memory region.
- the initial test target address is retrieved.
- the retrieved target address is compared with the memory defect map.
- the first available target address that is not listed in the memory defect map is then subjected to a memory test at 608 .
- a memory test at 608 .
- the process then continues to step 614 where it is determined whether there are any more memory locations that should be subjected to the memory test. If yes, then the next target address is retrieved at step 616 and the process is repeated. The process will finally terminate at step 618 once there are no more memory locations remaining to be tested.
- FIG. 7 a block diagram of the memory remapping resources of an information handling system is depicted generally with reference numeral 700 .
- the memory component 702 is coupled to address remapping unit 704 .
- the address remapping unit 704 is in turn coupled to the memory management unit (MMU) 706 and the hot spare 708 .
- MMU memory management unit
- Hot spare 708 is an extra unused memory space available as substitute for conventional memory in the event an emerging defect renders part of the memory component 702 unreliable.
- the address remapping unit 704 “maps out” or removes that defective portion 710 from the memory map and substitutes a portion of the spare memory 708 into its place in the memory map.
- the information existing in the defective portion 710 of the memory component is then corrected and copied into the spare memory 708 preventing the loss of data.
- any subsequent requests for access to the defective memory portion 710 are redirected to the spare memory 708 .
- the remapping process is repeated each time the system is reset.
- FIG. 8 depicts a method for updating a memory defect map and using the stored memory defect map to release the memory remapping resources of a system in accordance with an embodiment of the present invention.
- information regarding any defective memory locations detected during the manufacturing process may be stored as a memory defect map on the memory component itself, or on a nonvolatile memory storage coupled to the memory component, in accordance with an embodiment of the present invention.
- the address remapping unit 704 maps out any known defective memory locations using the existing memory defect map. Once a memory defect event occurs during the operation of the information handling system, the occurrence of the memory defect event is detected at step 802 .
- the address remapping unit 704 uses the spare memory to compensate for the defective memory location. Specifically, a portion of the spare memory 708 is substituted for the defective memory location 710 and the data in the defective memory location is copied into the substituted spare memory location. The defective memory location 710 is then mapped out and any calls for the defective memory location 710 are redirected to the substituted spare memory location 708 .
- the defective memory map is updated and the particular defective memory location giving rise to the memory defect event is added to the existing memory defect map.
- the spare memory is cleared at 810 and the process returns to step 800 with the address remapping unit 704 mapping out any defective memory locations as indicated by the existing memory defect map.
- the memory defect map is continuously updated as new memory defect events occur. Because the defective memory information is mapped out, the system ignores any memory locations that are known to be defective. Consequently, the remapping resources that are dedicated to remapping a memory location known to be defective are no longer at risk and can be released and returned to use in the event a new error emerges. Because the memory defect map is continuously updated and any emerging memory defect locations are continuously added to the memory defect map, the demand on the system's remapping resources will be minimized.
Abstract
Description
- The present disclosure relates generally to computer systems and information handling systems, and, more particularly, to a system and method for creating a map of memory which governs its use by the computer system or information handling system
- As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to these users is an information handling system. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may vary with respect to the type of information handled; the methods for handling the information; the methods for processing, storing or communicating the information; the amount of information processed, stored, or communicated; and the speed and efficiency with which the information is processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include or comprise a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
- A computing system will typically include some type of temporary information storage medium, such as random access memory. In recent computers, the amount of memory comprised by the information handling system may be on the order of gigabytes. As memory size increases, the likelihood that part of the memory will either be manufactured defective or become defective over time increases. If left unmanaged, the presence of defective memory cells, regardless of their size, can cause the information handling system to fail. Such failure can initiate an abrupt end to the current operation of the information handling system, resulting in the loss of critical data. In addition, the presence of defective memory can prevent the information handling system from starting up altogether.
- As computing systems continue to evolve and computer technology advances, the operational relationship between the CPU and memory becomes more significant. Many attributes of modern systems (specifically the introduction of multi-core processors and virtualization in general) are forcing an ever-growing memory footprint. Consequently, not only is system memory growing to be a much more substantial percentage of the overall solution cost, but the impact of erroneous behavior in the memory can have a much more adverse effect on the life cycle expenses associated with the computing system.
- In accordance with the present disclosure, a method for storing a memory defect map is disclosed whereby a memory component is tested for defects at the time of manufacture and any memory defects detected are stored in a memory defect map and used to optimize the system performance. The memory defect map is updated and the system's remapping resources optimized as new memory defects are detected during operation.
- A technical advantage of the present invention is that it significantly reduces the cost of an information handling system by allowing the use of memory components with known memory defects without jeopardizing the system performance. Availability of a non-volatile memory defect map allows an information handling system to utilize the memory component without “crashing.” Moreover, because the memory defect map is coupled to the memory component, the memory component can be moved from one system to another while retaining any defect information. The importance of this improvement is magnified as the system memory is growing to represent a substantial portion of the overall solution cost.
- Another technical advantage of the present invention is that it allows the system to maintain normal operations despite minor deficiencies in the system memory. By minimizing the impact of erroneous memory behavior a system and method in accordance with the present invention can significantly reduce the life cycle expenses associated with an information handling system. Yet another technical advantage of the present disclosure is that it reduces the need for any significant testing and characterization prior to conveying memory defect information to the information handling system. Other technical advantages will be apparent to those of ordinary skill in the art in view of the following specification, claims, and drawings.
- A more complete understanding of the present embodiments and advantages thereof may be acquired by referring to the following description taken in conjunction with the accompanying drawings, in which like reference numbers indicate like features, and wherein:
-
FIG. 1 is a block diagram of the components of an exemplary information handling system; -
FIG. 2 is a memory mapped by a memory mapping method. -
FIG. 3 is a memory space including some defective regions. -
FIG. 4 is a Dual In-line Memory Module with its associated Electrically Erasable Programmable Read-Only Memory. -
FIG. 5 is a flow diagram of a first method for using a memory defect map to avoid conducting a memory test on a memory location known to be defective. -
FIG. 6 is a flow diagram of a second method for using a memory defect map to avoid conducting a memory test on a memory location known to be defective. -
FIG. 7 is a block diagram of the memory remapping resources of an information handling system. -
FIG. 8 is a flow diagram of a method for updating a memory defect map and using the stored memory defect map to release the memory remapping resources of a system. - For purposes of this disclosure, an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory. Additional components of the information handling system may include one or more disk drives, one or more network ports for communication with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display. The information handling system may also include one or more buses operable to transmit communications between the various hardware components.
- Shown in
FIG. 1 is a block diagram of a typical information handling system. A processor orCPU 100 of the typicalinformation handling system 5 is communicatively coupled to a memory controller hub ornorth bridge 102.Memory controller hub 102 is coupled tomemory 104 and agraphics processing unit 106.Memory controller hub 102 is also coupled to an I/O controller hub orsouth bridge 108. I/O hub 108 is coupled to storage elements of the computer system, including astorage element 110 such as flash ROM for the Basic Input/Output System (BIOS) of the computer system and thehard drive 112 of the computer system. I/O hub 108 may also be coupled to a Super I/O chip 114, which is itself coupled to many of the I/O ports of the computer system, includingkeyboard 116,mouse 118, andparallel ports 120. -
FIG. 2 presents a diagram of the memory mapped by an E820 call or similar memory mapping method. The information handling system may be comprised of numerous distinct components capable of being addressed as memory, including Dual Inline Memory Modules (DIMMs) 200 andPCI devices 202, such as discrete graphics cards. These devices are detected during the BIOS initialization period and mapped to determine the location of system-accessible memory during the E820 call. The E820 call iteratively calls locations which may contain memory, beginning with the lowestpossible address 204. As system-accessible memory is located, includingDIMMs 200, the E820 call creates a map of such memory, but may exclude portions of memory from the map when designated as unavailable. The memory map is then used by the OS, which only sees the memory mapped as usable by the E820 call. -
FIG. 3 presents anexemplary memory space 300 with somedefective regions FIG. 4 . -
FIG. 4 presents a block diagram of memory elements intraditional DIMMs 400.Recent DIMMs 400 comprise bothRAM 402 and a quantity of Electrically Erasable Programmable Read-Only Memory (EEPROM) 404. EEPROM 404 can store Serial Presence Detect (SPD) information, which comprises data regarding the size, speed, electrical requirements and other information about theRAM 402. Standards of the JEDEC Solid State Technology Association specify that SPD information be stored in the lower 128bytes 406 of the EEPROM 404, but manyrecent DIMMs 400 include anadditional quantity 408 of EEPROM 404 which is not devoted to SPD information. - Each memory component is tested during or subsequent to being manufactured and any memory defect information is stored in a nonvolatile storage. In one embodiment, the nonvolatile storage is on the memory component itself. In the exemplary embodiment depicted in
FIG. 4 theunused portion 408 of the EEPROM 404 is used to store information about the location of defective memory in theRAM 402. Specifically, when a memory cell is identified as defective or it is otherwise determined that the system should not be granted access to that cell, a block of memory containing the memory cell in question is identified and its address is stored in theunused portion 408 of the EEPROM 404. The collection of defective memory locations is known as the memory defect map. - The memory defect map need not be stored in the on-chip EEPROM 404 used for SPD. Rather, any form of non-volatile storage could be utilized to store the map. A standard EEPROM 404 has the advantages of already being widely implemented and at least partially available for storage of the map. It is desirable that the memory map be stored on the DIMM itself, since it is advantageous for the map to remain with the DIMM it maps when, for example, the DIMM is moved from one system to another. Once the DIMM or other memory component is mated to a specific system, the memory defect information which is stored on the DIMM itself can be retrieved and used by the system as part of its memory allocation scheme.
- The memory defect information or memory defect map is a map where each entry corresponds to a region of physical address on the memory component. For example, where the memory component is a DIMM, these regions are defined by the DIMM capacity amortized across the number of entries in the map. The size of a memory block designated as defective is thus equal to the DIMM capacity divided by the number of bits in the defect map. As would be appreciated by those of ordinary skill in the art, with the benefit of this disclosure, the memory defect map is not limited to the information stored on the memory component during the manufacture process as disclosed here. For example, defect information may be obtained by an exhaustive software based memory test or an external test mechanism. The stored memory defect map can be used to optimize the system performance in a variety of ways.
- In one exemplary embodiment, the memory defect map may be used as a means for avoiding disruption of subsequent memory tests. Memory test are commonly carried out by an information handling system. For example, the BIOS may run an onboard test of the memory components. Typically, the memory test will also analyze the areas in the memory components where defects are already known to exist. Depending on the severity of the defect in the defective region, the analysis of the defective region may disrupt the test and potentially erode the behavior of the test. In one exemplary embodiment the stored memory defect map may be used to avoid redundant testing of regions already known to be defective.
-
FIG. 5 depicts a first method for using the stored memory defect map to avoid memory testing of defective memory regions. In this embodiment, the target memory test address is compared to the defective memory information and if it is found to be one of the known defective memory locations, then the testing of each address in the defective region is subsequently skipped and the target test address incremented until an address not contained in the defective region is obtained. First, atstep 500 the initial target address for the memory test is retrieved. Atstep 502, the initial target address is compared with the information in the stored memory defect map. Next, atstep 504, the stored memory defect map is used to determine whether the initial target address is an address corresponding to a known defective memory location. If the target address is found in the memory defect map then the memory test will not be conducted on the retrieved target address and the process skips to step 510. - If the target address is not in the memory defect map, then at step 506 a memory test is conducted to determine whether the target address nevertheless contains defective memory locations. As would be appreciated by those of ordinary skill in the art, with the benefit of this disclosure, a number of different tests may be conducted to determine whether the target location is a defective memory space.
- At
step 508 the result of the memory test is used to decide whether the target address corresponds to a defective memory location. If the target address is not defective then the process will continue to step 510 where it is determined whether there are more memory locations to be tested. If not the process terminates at 512 and if there are more memory locations to be tested, then the next address to be tested as retrieved at 514. In contrast, if the target address is defective then the memory defect map is updated atstep 516 and the target address is added to the list of addresses corresponding to defective memory locations before searching for additional locations to be tested. -
FIG. 6 depicts a second method for using a stored memory defect map to avoid memory testing of memory regions known to be defective. In this embodiment, once an address in a defective memory location is encountered, the test target address is incremented to reflect the first available address outside of the defective memory region. First, atstep 600, the initial test target address is retrieved. Atstep 602 the retrieved target address is compared with the memory defect map. Next, atstep 604 it is determined whether the retrieved target address is listed as defective in the memory defect map. If the retrieved target address matches an entry in the memory defect map, then the target address is incremented atstep 606. Iterations are carried out until the first available address that is not listed in the memory defect map is obtained. - The first available target address that is not listed in the memory defect map is then subjected to a memory test at 608. Next, at
step 610 it is determined whether the test indicated that the retrieved target address corresponded to a defective memory location. If yes, then the target address is added to the memory defect map atstep 612. The process then continues to step 614 where it is determined whether there are any more memory locations that should be subjected to the memory test. If yes, then the next target address is retrieved atstep 616 and the process is repeated. The process will finally terminate atstep 618 once there are no more memory locations remaining to be tested. - Turning now to
FIG. 7 , a block diagram of the memory remapping resources of an information handling system is depicted generally withreference numeral 700. Thememory component 702 is coupled to addressremapping unit 704. Theaddress remapping unit 704 is in turn coupled to the memory management unit (MMU) 706 and thehot spare 708. The MMU is a hardware component responsible for handling accesses to memory requested by the CPU. Hot spare 708 is an extra unused memory space available as substitute for conventional memory in the event an emerging defect renders part of thememory component 702 unreliable. Traditionally, when aportion 710 of thememory component 702 gives rise to a defective memory event, theaddress remapping unit 704 “maps out” or removes thatdefective portion 710 from the memory map and substitutes a portion of thespare memory 708 into its place in the memory map. The information existing in thedefective portion 710 of the memory component is then corrected and copied into thespare memory 708 preventing the loss of data. Once the remapping has occurred, any subsequent requests for access to thedefective memory portion 710 are redirected to thespare memory 708. In information handling systems in accordance with the prior art the remapping process is repeated each time the system is reset. -
FIG. 8 depicts a method for updating a memory defect map and using the stored memory defect map to release the memory remapping resources of a system in accordance with an embodiment of the present invention. As discussed above, information regarding any defective memory locations detected during the manufacturing process may be stored as a memory defect map on the memory component itself, or on a nonvolatile memory storage coupled to the memory component, in accordance with an embodiment of the present invention. As depicted inFIG. 8 , first, atstep 800, theaddress remapping unit 704 maps out any known defective memory locations using the existing memory defect map. Once a memory defect event occurs during the operation of the information handling system, the occurrence of the memory defect event is detected atstep 802. Atstep 804, theaddress remapping unit 704 uses the spare memory to compensate for the defective memory location. Specifically, a portion of thespare memory 708 is substituted for thedefective memory location 710 and the data in the defective memory location is copied into the substituted spare memory location. Thedefective memory location 710 is then mapped out and any calls for thedefective memory location 710 are redirected to the substitutedspare memory location 708. - Additionally, at
step 806 the defective memory map is updated and the particular defective memory location giving rise to the memory defect event is added to the existing memory defect map. Following a system reset 808 the spare memory is cleared at 810 and the process returns to step 800 with theaddress remapping unit 704 mapping out any defective memory locations as indicated by the existing memory defect map. Thus, the memory defect map is continuously updated as new memory defect events occur. Because the defective memory information is mapped out, the system ignores any memory locations that are known to be defective. Consequently, the remapping resources that are dedicated to remapping a memory location known to be defective are no longer at risk and can be released and returned to use in the event a new error emerges. Because the memory defect map is continuously updated and any emerging memory defect locations are continuously added to the memory defect map, the demand on the system's remapping resources will be minimized.
Claims (20)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/838,585 US7949913B2 (en) | 2007-08-14 | 2007-08-14 | Method for creating a memory defect map and optimizing performance using the memory defect map |
SG200805821-6A SG150449A1 (en) | 2007-08-14 | 2008-08-04 | Method for creating a memory defect map and optimizing performance using the memory defect map |
TW097130224A TWI370455B (en) | 2007-08-14 | 2008-08-08 | Method for creating a memory defect map and optimizing performance using the memory defect map |
CN200810210500.2A CN101369247B (en) | 2007-08-14 | 2008-08-13 | Method for creating a memory defect map and optimizing performance using the memory defect map |
EP08014502.2A EP2026356B1 (en) | 2007-08-14 | 2008-08-14 | Method for creating a memory defect map and optimizing performance using the memory defect map |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/838,585 US7949913B2 (en) | 2007-08-14 | 2007-08-14 | Method for creating a memory defect map and optimizing performance using the memory defect map |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090049351A1 true US20090049351A1 (en) | 2009-02-19 |
US7949913B2 US7949913B2 (en) | 2011-05-24 |
Family
ID=40196686
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/838,585 Active 2028-07-20 US7949913B2 (en) | 2007-08-14 | 2007-08-14 | Method for creating a memory defect map and optimizing performance using the memory defect map |
Country Status (5)
Country | Link |
---|---|
US (1) | US7949913B2 (en) |
EP (1) | EP2026356B1 (en) |
CN (1) | CN101369247B (en) |
SG (1) | SG150449A1 (en) |
TW (1) | TWI370455B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100299458A1 (en) * | 2004-09-20 | 2010-11-25 | Aaron Marking | Simple nonautonomous peering media clone detection |
US20110161731A1 (en) * | 2009-12-29 | 2011-06-30 | International Business Machines Corporation | Relocating bad block relocation (bbr) directory upon encountering physical media defect on a disk |
US20120185740A1 (en) * | 2011-01-19 | 2012-07-19 | Phison Electronics Corp. | Data writing method for non-volatile memory module and memory controller and memory storage apparatus using the same |
KR20140032788A (en) * | 2012-09-07 | 2014-03-17 | 삼성전자주식회사 | Nonvolatile memory module, memory system including nonvolatile memory module and controlling method of nonvolatile memory module |
US20140119131A1 (en) * | 2012-10-31 | 2014-05-01 | Freescale Semiconductor, Inc. | Memory device redundancy management system |
US11360840B2 (en) | 2020-01-20 | 2022-06-14 | Samsung Electronics Co., Ltd. | Method and apparatus for performing redundancy analysis of a semiconductor device |
US11734393B2 (en) | 2004-09-20 | 2023-08-22 | Warner Bros. Entertainment Inc. | Content distribution with renewable content protection |
US11790873B2 (en) | 2018-09-17 | 2023-10-17 | Apple Inc. | Correction for defective memory of a memory-in-pixel display |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8745323B2 (en) | 2011-09-01 | 2014-06-03 | Dell Products L.P. | System and method for controller independent faulty memory replacement |
US8724408B2 (en) | 2011-11-29 | 2014-05-13 | Kingtiger Technology (Canada) Inc. | Systems and methods for testing and assembling memory modules |
US8904228B2 (en) | 2011-12-07 | 2014-12-02 | Dell Products L.P. | Methods and systems for repairing memory |
US9117552B2 (en) * | 2012-08-28 | 2015-08-25 | Kingtiger Technology(Canada), Inc. | Systems and methods for testing memory |
CN104111895A (en) * | 2014-07-25 | 2014-10-22 | 记忆科技(深圳)有限公司 | Method for utilizing DRAM defective products |
CN106548809A (en) | 2015-09-22 | 2017-03-29 | 飞思卡尔半导体公司 | Process defect nonvolatile memory |
US9928924B2 (en) * | 2015-12-15 | 2018-03-27 | Qualcomm Incorporated | Systems, methods, and computer programs for resolving dram defects |
KR102420897B1 (en) * | 2016-03-17 | 2022-07-18 | 에스케이하이닉스 주식회사 | Memory module, memory system inculding the same, and operation method thereof |
CN108735268B (en) | 2017-04-19 | 2024-01-30 | 恩智浦美国有限公司 | Nonvolatile memory repair circuit |
KR20190032793A (en) * | 2017-09-20 | 2019-03-28 | 에스케이하이닉스 주식회사 | Memory module |
TWI676171B (en) * | 2018-09-18 | 2019-11-01 | 華邦電子股份有限公司 | Memory apparatus and interrupt handling method thereof |
Citations (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4209846A (en) * | 1977-12-02 | 1980-06-24 | Sperry Corporation | Memory error logger which sorts transient errors from solid errors |
US4240143A (en) * | 1978-12-22 | 1980-12-16 | Burroughs Corporation | Hierarchical multi-processor network for memory sharing |
US4426688A (en) * | 1981-08-03 | 1984-01-17 | Ncr Corporation | Memory system having an alternate memory |
US4479214A (en) * | 1982-06-16 | 1984-10-23 | International Business Machines Corporation | System for updating error map of fault tolerant memory |
US5450576A (en) * | 1991-06-26 | 1995-09-12 | Ast Research, Inc. | Distributed multi-processor boot system for booting each processor in sequence including watchdog timer for resetting each CPU if it fails to boot |
US5539697A (en) * | 1994-08-03 | 1996-07-23 | Bi-Search Corporation | Method and structure for using defective unrepairable semiconductor memory |
US5588112A (en) * | 1992-12-30 | 1996-12-24 | Digital Equipment Corporation | DMA controller for memory scrubbing |
US5666482A (en) * | 1994-03-31 | 1997-09-09 | Sgs-Thomson Microelectronics, Inc. | Method and system for bypassing a faulty line of data or its associated tag of a set associative cache memory |
US5671229A (en) * | 1989-04-13 | 1997-09-23 | Sandisk Corporation | Flash eeprom system with defect handling |
US5751641A (en) * | 1995-12-27 | 1998-05-12 | Sgs-Thomson Microelectronics, Inc. | Microprocessor memory test circuit and method |
US5758056A (en) * | 1996-02-08 | 1998-05-26 | Barr; Robert C. | Memory system having defective address identification and replacement |
US5764878A (en) * | 1996-02-07 | 1998-06-09 | Lsi Logic Corporation | Built-in self repair system for embedded memories |
US5774647A (en) * | 1996-05-15 | 1998-06-30 | Hewlett-Packard Company | Management of memory modules |
US5862314A (en) * | 1996-11-01 | 1999-01-19 | Micron Electronics, Inc. | System and method for remapping defective memory locations |
US5867702A (en) * | 1994-12-14 | 1999-02-02 | International Business Machines Corporation | Method and apparatus for initializing a multiprocessor system |
US5905858A (en) * | 1996-11-01 | 1999-05-18 | Micron Electronics, Inc. | System for method memory error handling |
US5986950A (en) * | 1997-10-15 | 1999-11-16 | International Business Machines Corporation | Use of redundant circuits to improve the reliability of an integrated circuit |
US5996096A (en) * | 1996-11-15 | 1999-11-30 | International Business Machines Corporation | Dynamic redundancy for random access memory assemblies |
US6035432A (en) * | 1997-07-31 | 2000-03-07 | Micron Electronics, Inc. | System for remapping defective memory bit sets |
US6125392A (en) * | 1996-10-11 | 2000-09-26 | Intel Corporation | Method and apparatus for high speed event log data compression within a non-volatile storage area |
US6154851A (en) * | 1997-08-05 | 2000-11-28 | Micron Technology, Inc. | Memory repair |
US6158025A (en) * | 1997-07-28 | 2000-12-05 | Intergraph Corporation | Apparatus and method for memory error detection |
US6173382B1 (en) * | 1998-04-28 | 2001-01-09 | International Business Machines Corporation | Dynamic configuration of memory module using modified presence detect data |
US6237110B1 (en) * | 1997-10-30 | 2001-05-22 | Kye Technology Corporation | Apparatus and method accessing flash memory |
US6260127B1 (en) * | 1998-07-13 | 2001-07-10 | Compaq Computer Corporation | Method and apparatus for supporting heterogeneous memory in computer systems |
US6285607B1 (en) * | 1998-03-27 | 2001-09-04 | Memory Corporation Plc | Memory system |
US6304989B1 (en) * | 1999-07-21 | 2001-10-16 | Credence Systems Corporation | Built-in spare row and column replacement analysis system for embedded memories |
US20010042225A1 (en) * | 1998-06-04 | 2001-11-15 | Darren J. Cepulis | Computer system implementing fault detection and isolation using unique identification codes stored in non-volatile memory |
US6324657B1 (en) * | 1998-06-11 | 2001-11-27 | Micron Technology, Inc. | On-clip testing circuit and method for improving testing of integrated circuits |
US20020073353A1 (en) * | 2000-12-13 | 2002-06-13 | Fish Andrew J. | Extensible BIOS error log |
US20020108072A1 (en) * | 2000-09-27 | 2002-08-08 | Beng Sim Jeffrey Soon | System and method for adaptive storage and caching of a defect table |
US20020120826A1 (en) * | 2001-02-23 | 2002-08-29 | Siva Venkatraman | Method and apparatus for reconfigurable memory |
US6460152B1 (en) * | 1998-03-11 | 2002-10-01 | Acuid Corporation Limited | High speed memory test system with intermediate storage buffer and method of testing |
US20020157048A1 (en) * | 2001-04-19 | 2002-10-24 | Micron Technology, Inc. | Memory with element redundancy |
US20020184445A1 (en) * | 2001-04-20 | 2002-12-05 | Rajasekhar Cherabuddi | Dynamically allocated cache memory for a multi-processor unit |
US6499120B1 (en) * | 1999-12-30 | 2002-12-24 | Infineon Technologies Richmond, Lp | Usage of redundancy data for displaying failure bit maps for semiconductor devices |
US6499117B1 (en) * | 1999-01-14 | 2002-12-24 | Nec Corporation | Network fault information management system in which fault nodes are displayed in tree form |
US20030005367A1 (en) * | 2001-06-29 | 2003-01-02 | Lam Son H. | Reporting hard disk drive failure |
US6536005B1 (en) * | 1999-10-26 | 2003-03-18 | Teradyne, Inc. | High-speed failure capture apparatus and method for automatic test equipment |
US20030058711A1 (en) * | 2001-09-25 | 2003-03-27 | Alexander Benedix | Method for integrating imperfect semiconductor memory devices in data processing apparatus |
US20030095455A1 (en) * | 2000-06-30 | 2003-05-22 | Chiaki Dono | Semiconductor integrated circuit |
US6600614B2 (en) * | 2000-09-28 | 2003-07-29 | Seagate Technology Llc | Critical event log for a disc drive |
US6601183B1 (en) * | 1999-09-30 | 2003-07-29 | Silicon Graphics, Inc. | Diagnostic system and method for a highly scalable computing system |
US20030145250A1 (en) * | 2002-01-29 | 2003-07-31 | Wen-Long Chin | Dynamic built-in self-skip method used for shared memory fault recovery |
US6622269B1 (en) * | 2000-11-27 | 2003-09-16 | Intel Corporation | Memory fault isolation apparatus and methods |
US20040034825A1 (en) * | 2002-08-16 | 2004-02-19 | Jeddeloh Joseph M. | System and method for self-testing and repair of memory modules |
US20040042293A1 (en) * | 2002-03-18 | 2004-03-04 | Hiroyuki Ogino | Semiconductor memory and method of testing the same |
US6728907B1 (en) * | 2000-04-14 | 2004-04-27 | Microsoft Corporation | System and method for self-diagnosing system crashes |
US20040088614A1 (en) * | 2002-11-01 | 2004-05-06 | Ting-Chin Wu | Management system for defective memory |
US6820224B1 (en) * | 2000-04-04 | 2004-11-16 | Promos Technologies Inc. | Method and system for increasing yield in embedded memory devices |
US20050022066A1 (en) * | 1999-07-16 | 2005-01-27 | Broadcom Corporation | Apparatus and method for managing memory defects |
US6889305B2 (en) * | 2003-02-14 | 2005-05-03 | Hewlett-Packard Development Company, L.P. | Device identification using a memory profile |
US20050120270A1 (en) * | 2003-11-19 | 2005-06-02 | International Business Machines Corporation | Automatic bit fail mapping for embedded memories with clock multipliers |
US20060004942A1 (en) * | 2004-06-30 | 2006-01-05 | Sun Microsystems, Inc. | Multiple-core processor with support for multiple virtual processors |
US20060059383A1 (en) * | 2004-08-31 | 2006-03-16 | Micron Technology, Inc. | Defective memory block identification in a memory device |
US7065630B1 (en) * | 2003-08-27 | 2006-06-20 | Nvidia Corporation | Dynamically creating or removing a physical-to-virtual address mapping in a memory of a peripheral device |
US7123051B1 (en) * | 2004-06-21 | 2006-10-17 | Altera Corporation | Soft core control of dedicated memory interface hardware in a programmable logic device |
US20060236165A1 (en) * | 2005-03-21 | 2006-10-19 | Cepulis Darren J | Managing memory health |
US20070061637A1 (en) * | 2005-09-12 | 2007-03-15 | Lsi Logic Corporation | Process for conducting high-speed bitmapping of memory cells during production |
US20070101238A1 (en) * | 2003-05-20 | 2007-05-03 | Cray Inc. | Apparatus and method for memory read-refresh, scrubbing and variable-rate refresh |
US20070136625A1 (en) * | 2005-11-30 | 2007-06-14 | Advantest Corporation | Test apparatus and test method |
US20070136385A1 (en) * | 2003-04-30 | 2007-06-14 | Alexander Abrashkevich | Defensive Heap Memory Management |
US20070150777A1 (en) * | 2005-12-26 | 2007-06-28 | Nec Electronics Corporation | Memory test circuit and method |
US7246269B1 (en) * | 2004-05-05 | 2007-07-17 | Advanced Micro Devices, Inc. | Efficient memory check architecture and method |
US20070174718A1 (en) * | 2005-12-30 | 2007-07-26 | Matthias Fouquet-Lapar | Generation and use of system level defect tables for main memory |
US20070217559A1 (en) * | 2006-03-16 | 2007-09-20 | Rambus Inc. | Signaling system with adaptive timing calibration |
US7285174B2 (en) * | 2001-08-30 | 2007-10-23 | Leibniz-Institut Fuer Festkoerper-Und Werkstoffforschung Dresden E.V. | Method for producing metallic strips |
US7346755B2 (en) * | 2003-09-16 | 2008-03-18 | Hewlett-Packard Development, L.P. | Memory quality assurance |
US20080229143A1 (en) * | 2006-09-21 | 2008-09-18 | Sony Computer Entertainment Inc. | Management of available circuits to repair defective circuits |
US20080247243A1 (en) * | 2007-04-05 | 2008-10-09 | Samsung Electronics Co., Ltd. | Semiconductor memory device including post package repair control circuit and post package repair method |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0704854B1 (en) | 1994-09-30 | 1999-12-01 | STMicroelectronics S.r.l. | Memory device having error detection and correction function, and methods for writing and erasing the memory device |
GB9614551D0 (en) | 1996-07-11 | 1996-09-04 | Memory Corp Plc | Memory system |
JP4121634B2 (en) | 1998-09-21 | 2008-07-23 | 株式会社アドバンテスト | Memory test equipment |
US7269765B1 (en) | 2000-04-13 | 2007-09-11 | Micron Technology, Inc. | Method and apparatus for storing failing part locations in a module |
US7035953B2 (en) | 2002-05-03 | 2006-04-25 | Hewlett-Packard Development Company, L.P. | Computer system architecture with hot pluggable main memory boards |
US7251744B1 (en) | 2004-01-21 | 2007-07-31 | Advanced Micro Devices Inc. | Memory check architecture and method for a multiprocessor computer system |
JP2005234744A (en) | 2004-02-18 | 2005-09-02 | Nec Corp | Multiprocessor system and failure processing method |
-
2007
- 2007-08-14 US US11/838,585 patent/US7949913B2/en active Active
-
2008
- 2008-08-04 SG SG200805821-6A patent/SG150449A1/en unknown
- 2008-08-08 TW TW097130224A patent/TWI370455B/en active
- 2008-08-13 CN CN200810210500.2A patent/CN101369247B/en active Active
- 2008-08-14 EP EP08014502.2A patent/EP2026356B1/en active Active
Patent Citations (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4209846A (en) * | 1977-12-02 | 1980-06-24 | Sperry Corporation | Memory error logger which sorts transient errors from solid errors |
US4240143A (en) * | 1978-12-22 | 1980-12-16 | Burroughs Corporation | Hierarchical multi-processor network for memory sharing |
US4426688A (en) * | 1981-08-03 | 1984-01-17 | Ncr Corporation | Memory system having an alternate memory |
US4479214A (en) * | 1982-06-16 | 1984-10-23 | International Business Machines Corporation | System for updating error map of fault tolerant memory |
US5671229A (en) * | 1989-04-13 | 1997-09-23 | Sandisk Corporation | Flash eeprom system with defect handling |
US5450576A (en) * | 1991-06-26 | 1995-09-12 | Ast Research, Inc. | Distributed multi-processor boot system for booting each processor in sequence including watchdog timer for resetting each CPU if it fails to boot |
US5588112A (en) * | 1992-12-30 | 1996-12-24 | Digital Equipment Corporation | DMA controller for memory scrubbing |
US5666482A (en) * | 1994-03-31 | 1997-09-09 | Sgs-Thomson Microelectronics, Inc. | Method and system for bypassing a faulty line of data or its associated tag of a set associative cache memory |
US5539697A (en) * | 1994-08-03 | 1996-07-23 | Bi-Search Corporation | Method and structure for using defective unrepairable semiconductor memory |
US5867702A (en) * | 1994-12-14 | 1999-02-02 | International Business Machines Corporation | Method and apparatus for initializing a multiprocessor system |
US5751641A (en) * | 1995-12-27 | 1998-05-12 | Sgs-Thomson Microelectronics, Inc. | Microprocessor memory test circuit and method |
US5764878A (en) * | 1996-02-07 | 1998-06-09 | Lsi Logic Corporation | Built-in self repair system for embedded memories |
US5758056A (en) * | 1996-02-08 | 1998-05-26 | Barr; Robert C. | Memory system having defective address identification and replacement |
US5774647A (en) * | 1996-05-15 | 1998-06-30 | Hewlett-Packard Company | Management of memory modules |
US6125392A (en) * | 1996-10-11 | 2000-09-26 | Intel Corporation | Method and apparatus for high speed event log data compression within a non-volatile storage area |
US5862314A (en) * | 1996-11-01 | 1999-01-19 | Micron Electronics, Inc. | System and method for remapping defective memory locations |
US5905858A (en) * | 1996-11-01 | 1999-05-18 | Micron Electronics, Inc. | System for method memory error handling |
US6052798A (en) * | 1996-11-01 | 2000-04-18 | Micron Electronics, Inc. | System and method for remapping defective memory locations |
US5996096A (en) * | 1996-11-15 | 1999-11-30 | International Business Machines Corporation | Dynamic redundancy for random access memory assemblies |
US6158025A (en) * | 1997-07-28 | 2000-12-05 | Intergraph Corporation | Apparatus and method for memory error detection |
US6035432A (en) * | 1997-07-31 | 2000-03-07 | Micron Electronics, Inc. | System for remapping defective memory bit sets |
US6154851A (en) * | 1997-08-05 | 2000-11-28 | Micron Technology, Inc. | Memory repair |
US5986950A (en) * | 1997-10-15 | 1999-11-16 | International Business Machines Corporation | Use of redundant circuits to improve the reliability of an integrated circuit |
US6237110B1 (en) * | 1997-10-30 | 2001-05-22 | Kye Technology Corporation | Apparatus and method accessing flash memory |
US6460152B1 (en) * | 1998-03-11 | 2002-10-01 | Acuid Corporation Limited | High speed memory test system with intermediate storage buffer and method of testing |
US6285607B1 (en) * | 1998-03-27 | 2001-09-04 | Memory Corporation Plc | Memory system |
US6173382B1 (en) * | 1998-04-28 | 2001-01-09 | International Business Machines Corporation | Dynamic configuration of memory module using modified presence detect data |
US20010042225A1 (en) * | 1998-06-04 | 2001-11-15 | Darren J. Cepulis | Computer system implementing fault detection and isolation using unique identification codes stored in non-volatile memory |
US6324657B1 (en) * | 1998-06-11 | 2001-11-27 | Micron Technology, Inc. | On-clip testing circuit and method for improving testing of integrated circuits |
US6260127B1 (en) * | 1998-07-13 | 2001-07-10 | Compaq Computer Corporation | Method and apparatus for supporting heterogeneous memory in computer systems |
US6499117B1 (en) * | 1999-01-14 | 2002-12-24 | Nec Corporation | Network fault information management system in which fault nodes are displayed in tree form |
US20050022066A1 (en) * | 1999-07-16 | 2005-01-27 | Broadcom Corporation | Apparatus and method for managing memory defects |
US6304989B1 (en) * | 1999-07-21 | 2001-10-16 | Credence Systems Corporation | Built-in spare row and column replacement analysis system for embedded memories |
US6601183B1 (en) * | 1999-09-30 | 2003-07-29 | Silicon Graphics, Inc. | Diagnostic system and method for a highly scalable computing system |
US6536005B1 (en) * | 1999-10-26 | 2003-03-18 | Teradyne, Inc. | High-speed failure capture apparatus and method for automatic test equipment |
US6499120B1 (en) * | 1999-12-30 | 2002-12-24 | Infineon Technologies Richmond, Lp | Usage of redundancy data for displaying failure bit maps for semiconductor devices |
US6820224B1 (en) * | 2000-04-04 | 2004-11-16 | Promos Technologies Inc. | Method and system for increasing yield in embedded memory devices |
US6728907B1 (en) * | 2000-04-14 | 2004-04-27 | Microsoft Corporation | System and method for self-diagnosing system crashes |
US20030095455A1 (en) * | 2000-06-30 | 2003-05-22 | Chiaki Dono | Semiconductor integrated circuit |
US20020108072A1 (en) * | 2000-09-27 | 2002-08-08 | Beng Sim Jeffrey Soon | System and method for adaptive storage and caching of a defect table |
US6600614B2 (en) * | 2000-09-28 | 2003-07-29 | Seagate Technology Llc | Critical event log for a disc drive |
US6622269B1 (en) * | 2000-11-27 | 2003-09-16 | Intel Corporation | Memory fault isolation apparatus and methods |
US20020073353A1 (en) * | 2000-12-13 | 2002-06-13 | Fish Andrew J. | Extensible BIOS error log |
US20020120826A1 (en) * | 2001-02-23 | 2002-08-29 | Siva Venkatraman | Method and apparatus for reconfigurable memory |
US20020157048A1 (en) * | 2001-04-19 | 2002-10-24 | Micron Technology, Inc. | Memory with element redundancy |
US20020184445A1 (en) * | 2001-04-20 | 2002-12-05 | Rajasekhar Cherabuddi | Dynamically allocated cache memory for a multi-processor unit |
US20030005367A1 (en) * | 2001-06-29 | 2003-01-02 | Lam Son H. | Reporting hard disk drive failure |
US7285174B2 (en) * | 2001-08-30 | 2007-10-23 | Leibniz-Institut Fuer Festkoerper-Und Werkstoffforschung Dresden E.V. | Method for producing metallic strips |
US20030058711A1 (en) * | 2001-09-25 | 2003-03-27 | Alexander Benedix | Method for integrating imperfect semiconductor memory devices in data processing apparatus |
US20030145250A1 (en) * | 2002-01-29 | 2003-07-31 | Wen-Long Chin | Dynamic built-in self-skip method used for shared memory fault recovery |
US20040042293A1 (en) * | 2002-03-18 | 2004-03-04 | Hiroyuki Ogino | Semiconductor memory and method of testing the same |
US20040034825A1 (en) * | 2002-08-16 | 2004-02-19 | Jeddeloh Joseph M. | System and method for self-testing and repair of memory modules |
US20040088614A1 (en) * | 2002-11-01 | 2004-05-06 | Ting-Chin Wu | Management system for defective memory |
US20050149687A1 (en) * | 2003-02-14 | 2005-07-07 | Adelmann Todd C. | Device identification using a memory profile |
US6889305B2 (en) * | 2003-02-14 | 2005-05-03 | Hewlett-Packard Development Company, L.P. | Device identification using a memory profile |
US20070136385A1 (en) * | 2003-04-30 | 2007-06-14 | Alexander Abrashkevich | Defensive Heap Memory Management |
US20070101238A1 (en) * | 2003-05-20 | 2007-05-03 | Cray Inc. | Apparatus and method for memory read-refresh, scrubbing and variable-rate refresh |
US7065630B1 (en) * | 2003-08-27 | 2006-06-20 | Nvidia Corporation | Dynamically creating or removing a physical-to-virtual address mapping in a memory of a peripheral device |
US7346755B2 (en) * | 2003-09-16 | 2008-03-18 | Hewlett-Packard Development, L.P. | Memory quality assurance |
US20050120270A1 (en) * | 2003-11-19 | 2005-06-02 | International Business Machines Corporation | Automatic bit fail mapping for embedded memories with clock multipliers |
US7246269B1 (en) * | 2004-05-05 | 2007-07-17 | Advanced Micro Devices, Inc. | Efficient memory check architecture and method |
US7123051B1 (en) * | 2004-06-21 | 2006-10-17 | Altera Corporation | Soft core control of dedicated memory interface hardware in a programmable logic device |
US20060004942A1 (en) * | 2004-06-30 | 2006-01-05 | Sun Microsystems, Inc. | Multiple-core processor with support for multiple virtual processors |
US20060059383A1 (en) * | 2004-08-31 | 2006-03-16 | Micron Technology, Inc. | Defective memory block identification in a memory device |
US7272758B2 (en) * | 2004-08-31 | 2007-09-18 | Micron Technology, Inc. | Defective memory block identification in a memory device |
US20060236165A1 (en) * | 2005-03-21 | 2006-10-19 | Cepulis Darren J | Managing memory health |
US20070061637A1 (en) * | 2005-09-12 | 2007-03-15 | Lsi Logic Corporation | Process for conducting high-speed bitmapping of memory cells during production |
US20070136625A1 (en) * | 2005-11-30 | 2007-06-14 | Advantest Corporation | Test apparatus and test method |
US20070150777A1 (en) * | 2005-12-26 | 2007-06-28 | Nec Electronics Corporation | Memory test circuit and method |
US20070174718A1 (en) * | 2005-12-30 | 2007-07-26 | Matthias Fouquet-Lapar | Generation and use of system level defect tables for main memory |
US7478285B2 (en) * | 2005-12-30 | 2009-01-13 | Silicon Graphics, Inc. | Generation and use of system level defect tables for main memory |
US20070217559A1 (en) * | 2006-03-16 | 2007-09-20 | Rambus Inc. | Signaling system with adaptive timing calibration |
US20080229143A1 (en) * | 2006-09-21 | 2008-09-18 | Sony Computer Entertainment Inc. | Management of available circuits to repair defective circuits |
US20080247243A1 (en) * | 2007-04-05 | 2008-10-09 | Samsung Electronics Co., Ltd. | Semiconductor memory device including post package repair control circuit and post package repair method |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10740453B2 (en) * | 2004-09-20 | 2020-08-11 | Warner Bros. Entertainment Inc. | Simple nonautonomous peering media clone detection |
US20100299458A1 (en) * | 2004-09-20 | 2010-11-25 | Aaron Marking | Simple nonautonomous peering media clone detection |
US11868170B2 (en) | 2004-09-20 | 2024-01-09 | Warner Bros. Entertainment Inc. | Simple nonautonomous peering media clone detection |
US11734393B2 (en) | 2004-09-20 | 2023-08-22 | Warner Bros. Entertainment Inc. | Content distribution with renewable content protection |
US20110161731A1 (en) * | 2009-12-29 | 2011-06-30 | International Business Machines Corporation | Relocating bad block relocation (bbr) directory upon encountering physical media defect on a disk |
US8140890B2 (en) * | 2009-12-29 | 2012-03-20 | International Business Machines Corporation | Relocating bad block relocation (BBR) directory upon encountering physical media defect on a disk |
US20120185740A1 (en) * | 2011-01-19 | 2012-07-19 | Phison Electronics Corp. | Data writing method for non-volatile memory module and memory controller and memory storage apparatus using the same |
US8667348B2 (en) * | 2011-01-19 | 2014-03-04 | Phison Electronics Corp. | Data writing method for non-volatile memory module and memory controller and memory storage apparatus using the same |
KR101987426B1 (en) | 2012-09-07 | 2019-09-30 | 삼성전자주식회사 | Nonvolatile memory module, memory system including nonvolatile memory module and controlling method of nonvolatile memory module |
KR20140032788A (en) * | 2012-09-07 | 2014-03-17 | 삼성전자주식회사 | Nonvolatile memory module, memory system including nonvolatile memory module and controlling method of nonvolatile memory module |
US8937845B2 (en) * | 2012-10-31 | 2015-01-20 | Freescale Semiconductor, Inc. | Memory device redundancy management system |
US20140119131A1 (en) * | 2012-10-31 | 2014-05-01 | Freescale Semiconductor, Inc. | Memory device redundancy management system |
US11790873B2 (en) | 2018-09-17 | 2023-10-17 | Apple Inc. | Correction for defective memory of a memory-in-pixel display |
US11360840B2 (en) | 2020-01-20 | 2022-06-14 | Samsung Electronics Co., Ltd. | Method and apparatus for performing redundancy analysis of a semiconductor device |
Also Published As
Publication number | Publication date |
---|---|
CN101369247B (en) | 2013-06-05 |
TW200917262A (en) | 2009-04-16 |
US7949913B2 (en) | 2011-05-24 |
EP2026356B1 (en) | 2016-07-20 |
CN101369247A (en) | 2009-02-18 |
SG150449A1 (en) | 2009-03-30 |
TWI370455B (en) | 2012-08-11 |
EP2026356A2 (en) | 2009-02-18 |
EP2026356A3 (en) | 2009-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7949913B2 (en) | Method for creating a memory defect map and optimizing performance using the memory defect map | |
US7945815B2 (en) | System and method for managing memory errors in an information handling system | |
CN106681931B (en) | Data storage device and operation method thereof | |
US8156392B2 (en) | Apparatus, system, and method for bad block remapping | |
CN107168886B (en) | Data storage device and operation method thereof | |
US9373362B2 (en) | System and method for implementing a memory defect map | |
US20120060054A1 (en) | Method for using bad blocks of flash memory | |
US20090049270A1 (en) | System and method for using a memory mapping function to map memory defects | |
US20130311709A1 (en) | Methods and apparatus for reallocating addressable spaces within memory devices | |
US20190179694A1 (en) | Data storage device, operating method thereof and storage system including the same | |
US20070294588A1 (en) | Performing a diagnostic on a block of memory associated with a correctable read error | |
CN109960466B (en) | Memory system and operating method thereof | |
US11360837B2 (en) | Handling operation system (OS) in system for predicting and managing faulty memories based on page faults | |
US20190108892A1 (en) | System and Method for Post-Package Repair Across DRAM Banks and Bank Groups | |
KR20160074025A (en) | Operating method for data storage device | |
US20220138096A1 (en) | Memory system | |
CN114647375B (en) | Providing devices with enhanced persistent memory region access capability | |
US11036493B2 (en) | Memory system and operating method thereof | |
US11169871B2 (en) | Data storage device and operating method thereof | |
TWI516934B (en) | Data storing method, memory control circuit unit and memory stoarge apparatus | |
US8738847B2 (en) | Data writing method, and memory controller and memory storage apparatus using the same | |
CN112540869A (en) | Memory controller, memory device, and method of operating memory device | |
US7478289B1 (en) | System and method for improving the yield of integrated circuits containing memory | |
US11720276B2 (en) | Memory system and controller for managing write status | |
US9128887B2 (en) | Using a buffer to replace failed memory cells in a memory component |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DELL PRODUCTS L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NORROD, FORREST E.;PIKE, JIMMY D.;NEWELL, TOM L.;REEL/FRAME:020409/0556;SIGNING DATES FROM 20080122 TO 20080123 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NORROD, FORREST E.;PIKE, JIMMY D.;NEWELL, TOM L.;SIGNING DATES FROM 20080122 TO 20080123;REEL/FRAME:020409/0556 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FIRST LIEN COLLATERAL AGENT, TEXAS Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:031897/0348 Effective date: 20131029 Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, TEXAS Free format text: PATENT SECURITY AGREEMENT (ABL);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031898/0001 Effective date: 20131029 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT (TERM LOAN);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031899/0261 Effective date: 20131029 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH Free format text: PATENT SECURITY AGREEMENT (TERM LOAN);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031899/0261 Effective date: 20131029 Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FI Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:031897/0348 Effective date: 20131029 Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, TE Free format text: PATENT SECURITY AGREEMENT (ABL);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031898/0001 Effective date: 20131029 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: COMPELLANT TECHNOLOGIES, INC., MINNESOTA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: SECUREWORKS, INC., GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: PEROT SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: APPASSURE SOFTWARE, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 |
|
AS | Assignment |
Owner name: PEROT SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: SECUREWORKS, INC., GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: APPASSURE SOFTWARE, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: COMPELLENT TECHNOLOGIES, INC., MINNESOTA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: APPASSURE SOFTWARE, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: PEROT SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: SECUREWORKS, INC., GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: COMPELLENT TECHNOLOGIES, INC., MINNESOTA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001 Effective date: 20200409 |
|
AS | Assignment |
Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MOZY, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MAGINATICS LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL INTERNATIONAL, L.L.C., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: AVENTAIL LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |